How to avoid phishing attacks

- [Instructor] In this video we're gonna cover…how to defend against phishing attacks…including spear phishing and whaling attacks.…Let's start with the most important point.…Don't let your emotions or quest for high productivity…lure you into taking the first step into the trap,…opening an unexpected message.…Before you open it slow down and think critically…so you don't get lured all the way into the trap.…Remember to consider your risk appetite…or your employers when considering what to do next.…

Follow this triage process.…First slow your momentum…by physically looking away from the screen…for a few moments or pushing back from your desk.…Now look at the sender.…Is this really from your friend or an organization…that you do business with?…Look at the message body.…Are the text and graphics as authentic…as others you've received from this sender before?…Are you being asked to transfer money or sensitive data?…Now hover your mouse over any links in the message.…

Does the text in the pop up box match what you see…

Resume Transcript Auto-Scroll

Author

Released

9/17/2018

Most executives want to be better cyber risk managers. They want to manage cybersecurity risks in the same thoughtful and intelligent way as they manage other aspects of their business. Fortunately, you don't need to be a technology expert to improve your cyber risk management skills. This course provides practical, to-the-point training for the busy executive, in everyday language, complete with examples that are easy to understand. Instructor Kip Boyle describes the big picture events driving cybercrimes today and the top cyber risks affecting executives and their organizations. He provide examples of common cyberattacks, including actual impacts to real organizations. He uses germ theory to explain how good "security hygiene" can help you and your organization combat security threats, and introduces the top actions executives can take to avoid threats such as phishing, identity theft, hacking, and financial fraud. Plus, learn how contract "firewalls" and third-party cyber risk management can help you mitigate the most common cyber risks.